نتایج جستجو برای: image authentication

تعداد نتایج: 408635  

Journal: :Int. J. Imaging Systems and Technology 2004
Hae Yong Kim Amir Afif

Authentication watermark is a hidden data inserted into an image that can be used to detect any accidental or malicious alteration in the image. In the literature, there are many authentication-watermarking techniques for continuous-tone images. However, quite a small number of secure authentication watermarking techniques are available for binary/halftone images. This paper proposes a simple s...

2007
Yi-Bo Zhang Qin Li Jane You Prabir Bhattacharya

The most common method used for authentication is Textual passwords. But Textual passwords are in risk to eves dropping, dictionary attacks, social engineering and shoulder surfing. Biometric passwords are introduced as alternative techniques to textual passwords. Biometrics is used for human recognition which consists of authentication, verification and recognition. A CCD camera will capture t...

2014
Chang-Ming Wu Yu-Chen Hu Kuo-Yu Liu Jun-Chou Chuang

In this paper, a simple active image authentication scheme for the compressed images of block truncation coding (BTC) is proposed. In this scheme, the authentication codes of the compressed blocks are generated from the random value induced by the random seed. The authentication code of each compressed block is embedded into the bit map. The bit length of each authentication code can be chosen ...

2010
N. Selvaraju

An embedded Crypto-Biometric authentication scheme for ATM banking systems is proposed in our paper. In this scheme, cryptography and biometric techniques are fused together for person authentication to ameliorate the security level. The fingerprint template including singular points, frequency of ridges and minutiae are stored at the central banking server when enrollment. At the time of trans...

1998
Ching-Yung Lin Shih-Fu Chang

Image authentication veriies the originality of an image by detecting malicious manipulations. This goal is diierent from that of image watermarking which embeds into the image a signature surviving most manipulations. Existing methods for image authentication treat all types of manipulation equally (i.e., as unacceptable). However, some applications demand techniques that can distinguish accep...

Journal: :IEEE Trans. Circuits Syst. Video Techn. 2001
Ching-Yung Lin Shih-Fu Chang

Image authentication verifies the originality of an image by detecting malicious manipulations. Its goal is different from that of image watermarking, which embeds into the image a signature surviving most manipulations. Most existing methods for image authentication treat all types of manipulation equally (i.e., as unacceptable). However, some practical applications demand techniques that can ...

2004
Samia Boucherkha Mohamed Benmohamed

In this paper we investigate the watermarking authentication when applied to medical imagery field. We first give an overview of watermarking technology by paying attention to fragile watermarking since it is the usual scheme for authentication. We then analyze the requirements for image authentication and integrity in medical imagery, and we show finally that invertible schemes are the best su...

2005
Xiaoyun Wu Xiaoping Liang Hongmei Liu Jiwu Huang Guoping Qiu

Semi-fragile image authentication based on watermarking has drawn extensive attention. However, conventional watermarking techniques introduce irreversible distortions to the host signals and thus may not be allowable in some applications such as medical and military imaging. Though some reversible fragile authentication algorithms had been developed, reversible semi-fragile authentication pres...

2007
G. NIRANJANA

Password authentication is failing as an authentication since it increases the user burden to remember the passwords. Graphical authentication is proposed as a alternative for textual passwords since it may be easy for users to remember.In this paper we propose a new image region selection based graphical password scheme. We are going to present a new technique for authentication which is based...

2016
Ching-Yung Lin

Multimedia authentication distinguishes itself from other data integrity security issues because of its unique property of content integrity in several different levels — from signal syntax levels to semantic levels. In this section, we describe several image authentication issues, including the mathematical forms of optimal multimedia authentication systems, a description of robust digital sig...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید